CN101834752A - Messaging device, Network Interface Unit and control method thereof - Google Patents

Messaging device, Network Interface Unit and control method thereof Download PDF

Info

Publication number
CN101834752A
CN101834752A CN201010133053A CN201010133053A CN101834752A CN 101834752 A CN101834752 A CN 101834752A CN 201010133053 A CN201010133053 A CN 201010133053A CN 201010133053 A CN201010133053 A CN 201010133053A CN 101834752 A CN101834752 A CN 101834752A
Authority
CN
China
Prior art keywords
messaging device
bag
information
unit
network interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201010133053A
Other languages
Chinese (zh)
Other versions
CN101834752B (en
Inventor
静野香织
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Canon Inc
Original Assignee
Canon Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Canon Inc filed Critical Canon Inc
Publication of CN101834752A publication Critical patent/CN101834752A/en
Application granted granted Critical
Publication of CN101834752B publication Critical patent/CN101834752B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/12Arrangements for remote connection or disconnection of substations or of equipment thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/164Implementing security features at a particular protocol layer at the network layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/12Protocol engines
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Abstract

The invention provides a kind of messaging device, Network Interface Unit and control method thereof, described messaging device comprises: memory cell, its be configured to store by obtain with the negotiation of external equipment, be used for the information that communicates via network; Detecting unit when it is configured to operate under the normal electricity pattern, detects and whether satisfies the condition of power consumption less than the battery saving mode of described normal electricity pattern that be transformed into; And notification unit, it is configured to when satisfying when being transformed into the condition of described battery saving mode, to Network Interface Unit notice institute canned data.

Description

Messaging device, Network Interface Unit and control method thereof
Technical field
The present invention relates to a kind of messaging device that is connected to network and can communicates with external equipment via Network Interface Unit.
Background technology
Traditionally, known information processing system with battery saving mode of the minimum power consumption when being used to make standby.As the example of this information processing system, there are messaging device that comprises the main body side that is provided with main central processing unit (CPU) and the communication system that is provided with network interface unit (NIC) equipment of secondary CPU.Usually, this communication system makes the messaging device of main body side enter battery saving mode during battery saving mode, and uses each module standby when being provided normal electricity of the NIC equipment of less electric power.
TOHKEMY 2006-259906 communique discloses: when the normal electricity mode switch to battery saving mode, when stopping to provide electric power to host CPU, the address of the multicast bag (multicast packet) that host CPU will respond to secondary CPU notice.This makes that when secondary CPU received the multicast bag, secondary CPU can replace host CPU to respond when the electric power supply to host CPU stops, and this has eliminated the needs that start host CPU.In other words, can continue the longer time, improve the effect of power saving thus stopping of supplying with of the electric power of host CPU.
In recent years, as the technology of network path being encrypted, known encryption system such as internet protocol secure (IPSec) and secure socket layer (ssl) with the protection confidential information.The use of these technology can transmit data with the form of data encryption via network, and prevents leakage of information.
As the Valuation Standard of when system is connected to Local Area Network, using, known 802.1X.802.1X connection is limited to prevent that the terminal installation outside the predetermined terminal device is connected to computer network with system by authentication.
The information registering of the bag that will respond when as mentioned above, the messaging device of main body side being entered battery saving mode is in NIC equipment, so that NIC equipment can replace the messaging device of main body side that the bag that receives is responded.
When NIC equipment replaced the messaging device of main body side to respond, if encrypted via the bag of network transmission, then NIC equipment possibly can't suitably respond.
In other words, when making NIC equipment replace the messaging device of main body side to respond, the pattern of the bag that NIC equipment will be responded and register in the NIC equipment as the bag that will send to response with the bag of this pattern matching.The NIC equipment that this means the bag of the pattern matching that receives and register sends the bag corresponding to this pattern.If the bag that NIC equipment receives is encrypted, the pattern of the bag that will encrypt and registration compares then, even the pattern matching of Bao content and registration then, the pattern that yet is defined as content and registration does not match.
In this case, the messaging device of main body side turns back to the normal electricity pattern from battery saving mode, and the bag that receives of NIC equipment will be sent to the messaging device of main body side.Therefore, this messaging device that has increased main body side turns back to the number of times of normal electricity pattern from battery saving mode, has weakened the effect of power saving.
NIC equipment can comprise and is used to carry out the configuration handled with the similar encryption and decryption of the messaging device of main body side, yet it may cause following situation.
When the messaging device of main body side was carried out coded communication, the messaging device of main body side was held consultation with the external equipment as the opposing party of coded communication in advance, to obtain and to store the information that is used to carry out coded communication.When the messaging device of main body side is carried out coded communication, use institute's canned data.
Yet, if the messaging device of main body side is transformed into battery saving mode, and NIC equipment and external equipment execution coded communication, NIC equipment will be held consultation once more with external equipment.This processing may cause following situation, and promptly NIC equipment and external equipment both bear unnecessary load, and the negotiation of spended time reduces communication efficiency.
In addition, usually, aspect hardware configuration (treatment effeciency of CPU and memory span), NIC equipment is poorer than the messaging device of main body side.Therefore, be difficult to the NIC equipment configuration is used for the configuration of holding consultation with external equipment and is used to carry out the configuration that encryption and decryption are handled.
This is applicable to the Verification System such as 802.1X.If the messaging device of main body side is transformed into battery saving mode, and the messaging device and the external equipment executive communication of NIC equipment replacement main body side, then between NIC equipment and external equipment, hold consultation once more.
Summary of the invention
The present invention proposes for solving the aforementioned problems in the prior.
According to an aspect of the present invention, provide a kind of messaging device, this messaging device comprises: memory cell, be configured to store by obtain with the negotiation of external equipment, be used for the information that communicates via network; Detecting unit when being configured to operate under the normal electricity pattern, detecting and whether satisfies the condition of power consumption less than the battery saving mode of described normal electricity pattern that be transformed into; And notification unit, be configured to when satisfying when being transformed into the condition of described battery saving mode, to Network Interface Unit notice institute canned data.
According to the present invention, enter when messaging device under the situation of battery saving mode, even sent the bag of encrypting, also can the bag that receive be decrypted, and not need Network Interface Unit and external equipment to hold consultation once more from external equipment.
To the detailed description of exemplary embodiment, it is obvious that further feature of the present invention and aspect will become from reference to the accompanying drawings.
Description of drawings
The accompanying drawing that is included in the specification and constitutes the part of specification shows exemplary embodiment of the present invention, feature and aspect, and is used from specification one and explains principle of the present invention.
Fig. 1 is the general illustration that comprises the network of communication system.
Fig. 2 is the block diagram that the hardware configuration of communication system is shown.
Fig. 3 is the block diagram that the software arrangements of communication system is shown.
Fig. 4 is the table that is illustrated in the example of security association (SA) information of using in the IPSec communication.
Fig. 5 is the flow chart of the operation of descriptor treatment facility.
Fig. 6 is the flow chart of the operation of descriptor treatment facility.
Fig. 7 is a flow chart of describing the operation of NIC.
Fig. 8 is a flow chart of describing the operation of NIC.
Fig. 9 is a flow chart of describing the operation of NIC.
Figure 10 is a flow chart of describing the operation of NIC.
Figure 11 is the general illustration that comprises the network of communication system.
Figure 12 is the block diagram that the software arrangements of communication system is shown.
Figure 13 is the flow chart of the operation of descriptor treatment facility.
Figure 14 is a flow chart of describing the operation of NIC.
Figure 15 is a flow chart of describing the operation of NIC.
Figure 16 is a flow chart of describing the operation of NIC.
Embodiment
Below, describe various exemplary embodiment of the present invention, feature and aspect with reference to the accompanying drawings in detail.
Following illustrative embodiment does not limit the invention according to claim, and all combination restriction of the feature that will not describe in the exemplary embodiment are solution of the present invention.
First exemplary embodiment is described communication system and is carried out processing under the situation of coded communication.As the example of coded communication, the situation of using internet protocol secure (IPSec) to communicate is described.
The agreement that the data that IPSec is to use specific authentication algorithm or cryptographic algorithm to prevent to circulate on network are eavesdropped or changed.IPSec comprises authentication header (AH, authentication header) and two agreements of encapsulation safe and effective load (ESP, encapsulations security payload).AH only authenticates, and ESP authenticates and encrypt.Use which agreement and use the identifying algorithm of which kind of type or cryptographic algorithm to hold consultation to determine by before beginning in IPSec communication.To before IPSec communication beginning, the key that uses the Internet Key Exchange (IKE, Internet key exchange) to use in identifying algorithm in exchange between the communication terminal defines.Requests for comments (RFC, Request for comment) definition comprises the details of the IPSec and the IKE of packet format.
Fig. 1 is the general illustration that comprises the network of communication system 100.Communication system 100 is connected to personal computer (PC) 110 via LAN120, and communication system 100 can communicate each other with PC 110.Communication system 100 is provided with PC 110 and is used to carry out the configuration that IPSec communicates by letter.IPSec is applicable to all communications between communication system 100 and the PC 110.
Fig. 2 is the block diagram that the hardware configuration of communication system 100 is shown.Communication system 100 comprises messaging device 210 and NIC 220.Messaging device 210 is connected to LAN 120 via NIC 220.
CPU 211 carries out the software program of messaging device 210, with the control entire equipment.Random-access memory (ram) 214 is used for when CPU 211 control appliances, temporary storaging data.The boot and the preset parameter of read-only memory (ROM) 213 memory devices.
Hard disk drive (HDD) 215 is used for store various kinds of data.Various values of setting of nonvolatile RAM (NVRAM) 216 stored information treatment facilities 210.Operating unit interface (I/F) 217 control operation unit 230 make the liquid crystal panel that is arranged on the operating unit 230 show various operation screens, and will send to CPU 211 via the user instruction of operation screen input.
Scanner I/F 218 gated sweep devices 240.Scanner 240 reads the image on the original copy, to generate view data.Printer I/F 219 control printers 250.Printer 250 is printed the image based on view data on recording medium.Expansion I/F 212 is connected to the expansion I/F 222 of NIC 220 sides, and control is via the data communication of the external equipment (PC110) on NIC 220 and the LAN 120.
CPU 221 carries out the software program of NIC 220, with the control entire equipment.RAM 224 is used for temporary storaging data when CPU 221 control appliances.The boot and the preset parameter of ROM 223 memory devices.
Expansion I/F 222 is connected to the expansion I/F 212 of messaging device 210 sides, and the data communication between control information treatment facility 210 and the NIC 220.Network I/F 225 is connected to LAN 120, and the data communication between the external equipment (PC 110) on control NIC 220 (messaging device 210 and communication system 100) and the LAN 120.
Messaging device 210 is operated under the battery saving mode less than the power consumption under the normal electricity pattern in normal electricity pattern or power consumption.When messaging device 210 during, stop the electric power of CPU 211, HDD 215, NVRAM 216 and other parts is supplied with from the normal electricity mode switch to battery saving mode.On the other hand, NIC 220 is by application-specific integrated circuit (ASIC) (ASIC) operation different with messaging device 210.Therefore, even when messaging device 210 is transformed into battery saving mode, continues that also NIC 220 is carried out electric power and supply with, with the proxy response function that realizes describing after a while.
Fig. 3 is the block diagram that the software arrangements of communication system 100 is shown.Conversion between sleep control unit 310 control normal electricity patterns and the battery saving mode.IPSec processing unit 309 obtains handling through consultation of the information that is used to carry out IPSec communication and bag that the subtend external equipment sends and the encryption/decryption process of the bag that receives from external equipment.
IPSec control unit 308 control IPSec processing units 309, and storage is used for the information that IPSec processing unit 309 carries out the processing relevant with IPSec.Communication unit 307 between the CPU sends data and receives data from this software to the software of operation on NIC 220 via expansion I/F 212 and expansion I/F 222.Communication unit 306 between the CPU sends data and receives data from this software to the software of operation on messaging device 210 via expansion I/F 222 and expansion I/F 212.
IPSec processing unit 304 carries out bag that the subtend external equipment sends and the encryption/decryption process of the bag that receives from external equipment.Different with IPSec processing unit 309, IPSec processing unit 304 does not comprise the configuration that is used to obtain the negotiation of carrying out the information that IPSec signal post uses, yet IPSec processing unit 304 can be similar with IPSec processing unit 309 in configuration.IPSec control unit 303 control IPSec processing units 304, and storage is used for the information that IPSec processing unit 304 carries out the processing relevant with IPSec.
Network I/F control unit 305 is controlled the transmission and the reception of the bag that is undertaken by network I/F 225.Network I/F control unit 305 monitor message treatment facilities 210 with which pattern (normal electricity pattern or battery saving mode) are operated.When messaging device 210 is operated with the normal electricity pattern, network I/F control unit 305 will send to messaging device 210 from the bag that LAN 120 receives.When messaging device 210 is operated with battery saving mode, network I/F control unit 305 will send to IPSec processing unit 304 from the bag that LAN 120 receives.
Proxy response processing unit 301 receives the reception bag that sends from IPSec processing unit 304.IPSec processing unit 304 only receives bag when messaging device 210 is operated with battery saving mode, therefore, proxy response processing unit 301 is only operation in this case also.
The bag that proxy response processing unit 301 will receive is divided into three types, " bag that will abandon ", " will be sent to the bag of messaging device 210 " and " will on behalf of response bag "." bag that will abandon " is meant insignificant bag, for example not towards the bag of NIC equipment (promptly do not need respond bag).If bag is classified in " bag that will abandon ", then the bag that will receive abandons.
" to be sent to the bag of messaging device 210 " and be meant the reception bag that some processing (can't only provide by NIC 220 but handle) is provided.If receive this bag, then proxy response processing unit 301 makes messaging device 210 turn back to the normal electricity pattern from battery saving mode, and the bag that will receive is sent to messaging device 210.
" will on behalf of response bag " be meant the bag that NIC 220 replaces messaging devices 210 to respond.In this case, proxy response processing unit 301 uses IPSec to send the 302 pairs of bags that will send in response in processing storehouse and encrypts, and sends the bag of encrypting then.
IPSec sends and handles storehouse 302 is the modules that are used to provide application programming interfaces (API), and it is to carrying out encryption from proxy response processing unit 301 as the bag that inner parameter transmits.IPSec sends the bag that will encrypt in processing storehouse 302 and exports as external parameter with the API return value.
Fig. 4 shows the security association database (SAD) among the RAM224 of the RAM 214 that is stored in messaging device 210 and NIC 220.SAD is used for storage security association (SA) database of information.SA information is meant the one-way communication information of IPSec communication.SAD is generated by each IPSec control unit, and will be SAD by IPSec control unit and the external equipment SA information setting of determining of holding consultation.
Security Parameter Index (SPI) the 401st is used to discern the value of SA.The type of the cryptographic algorithm that cryptographic algorithm 402 indications are used in this communication.The type of the identifying algorithm that identifying algorithm 403 indications are used in this communication.Encryption key 404 indications are used for encrypted secret key information is carried out in this communication.Authenticate key 405 indication is used for key information that this communication is authenticated.Life-span type 406 which physical quantity of indication (data volume (is unit with kilobytes) that elapsed time (is unit with the second) still will send after the generation SA) are as the term of validity of SA.The actual value in 407 indication SA life-spans of life-span.
Time when SA rise times 408 indication generates SA (with the second of process after the system start-up), when the time was set to SA life-span type 406, the SA rise time 408 was used for determining the validity of SA.Send data volume 409 indications and generate the data volume that sends after the SA, when data volume is set to SA life-span type 406, send the validity that data volume 409 is used for determining SA.Sequence number 410 indications are used to protect SA to avoid the value of Replay Attack (replay attack), and it is set to the IPSec head, and when each transmission is wrapped it are increased by 1.
The address, transmission source IP (IPv6) that the IPSec that transmission source address 411 indications are associated with SA communicates by letter.The address, transmission destination IP (IPv6) that the IPSec that 412 indications of transmission destination-address are associated with SA communicates by letter.The transmission source port number that the IPSec that 413 indications of transmission source port number are associated with SA communicates by letter.The transmission destination port numbers that the IPSec that port numbers 414 indications of transmission destination are associated with SA communicates by letter.The protocol type that the IPSec that protocol type 415 indications are associated with SA communicates by letter.
Fig. 5 to Figure 10 describes when messaging device 210 enters battery saving mode, and messaging device 210 is notified the flow chart of the SA information processing of obtaining by messaging device 210 and PC 110 negotiations to NIC 220.
Each operation (step) shown in the flow chart of Fig. 5 and Fig. 6 is realized by CPU 211 executive control programs of messaging device 210.Each operation (step) shown in the flow chart of Fig. 7 to Figure 10 is realized by CPU 221 executive control programs of NIC 220.
Below, the operation of sleep control unit 310 is described with reference to Fig. 5.When detecting messaging device 210, sleep control unit 310 satisfies when being transformed into the condition of battery saving mode each processing shown in the flow chart of sleep control unit 310 execution graphs 5.
In step S501, whether sleep control unit 310 can be transformed into sleep state to each software module inquiry message treatment facility 210 of registration in advance, is transformed into sleep state with inspection and whether causes any problem.In this exemplary embodiment, IPSec control unit 308 is registered as about messaging device 210 whether to be transformed into dormant inquiry target.For example, when IPSec processing unit 309 and external equipment were held consultation, messaging device 210 cannot be transformed into sleep state.
As mentioned above, in communication system 100, the IPSec processing unit 304 of NIC 220 does not comprise and is used for the configuration of holding consultation with external equipment.Minimum power consumption when its purpose is to make standby by the configuration of simplifying NIC 220 even because after messaging device 210 enters battery saving mode, also continues NIC 220 is carried out the supply of electric power.
In step S502, sleep control unit 310 determines based on to whether can be transformed into the response of dormant inquiry about messaging device 210 whether messaging device 210 can be transformed into sleep state.If messaging device 210 can be transformed into sleep state ("Yes" among the step S502), then handle and proceed to step S504, otherwise ("No" among the step S502) handles proceeding to step S503.In step S503, handle and wait for, and turn back to step S501 once more up to the process scheduled time.
In step S504, sleep control unit 310 is transformed into sleep state to IPSec control unit 308 notices.In step S505,310 standbies of sleep control unit receive the response that is transformed into dormant module (IPSec control unit 308) from notified up to sleep control unit 310.If sleep control unit 310 receives the response ("Yes" among the step S505) from IPSec control unit 308, then in step S506, messaging device 210 is transformed into sleep state (battery saving mode), and end process.
Below, the operation of IPSec control unit 308 is described with reference to Fig. 6.In step S601,308 standbies of IPSec control unit are transformed into sleep state up to sleep control unit 310 to IPSec control unit 308 notices.
If sleep control unit 310 is transformed into sleep state ("Yes" among the step S601) to IPSec control unit 308 notices, then handle proceeding to step S602, the SAD update mark is set to close (OFF).The SAD update mark is stored in the zone of guaranteeing on the RAM 214.IPSec processing unit 309 is with reference to this mark, if this mark is set to OFF, then stop to handle, up to this mark transitions for opening (ON).
In step S603, IPSec control unit 308 obtains the SA information that is stored among the RAM 214.In step S604, whether there is any effective SA information in the information that IPSec control unit 308 is determined to obtain in step S603.If there is any effective SA information ("Yes" among the step S604), then to handle and proceed to step S605, IPSec control unit 308 is notified the SA information via the communication unit between the CPU 307 to NIC 220.
In step S606, IPSec control unit 308 sends response to sleep control unit 310.Afterwards, messaging device 210 enters sleep pattern, makes 308 shut-down operations of IPSec control unit.
In step S607, IPSec control unit 308 determines whether messaging device 210 turns back to the normal electricity pattern from battery saving mode.If messaging device 210 turns back to normal electricity pattern ("Yes" among the step S607), then in step S608, IPSec control unit 308 determines whether to receive SA information from NIC 220.
If messaging device 210 receives SA information ("Yes" the step S608) from NIC 220, then to handle and proceed to step S609, the SA information updating that use receives is stored in the SA information among the RAM214.In step S610, the SAD update mark that the renewal of indication SA information is finished is set to ON.
Fig. 7 shows the operation of the IPSec control unit 303 of NIC 220.In step S701, IPSec control unit 303 SA message pick-up marks are set to OFF.In the zone that SA message pick-up marker stores is guaranteed on RAM 224.IPSec processing unit 304 is with reference to this mark.
In step S702, IPSec control unit 303 is waited for from messaging device 210 and is received SA information.If IPSec control unit 303 receives SA information ("Yes" among the step S702), then handle and proceed to step S703.IPSec control unit 303 is guaranteed the SAD zone on RAM 224, and with the SA information stores that receives therein.Processing proceeds to step S704, and IPSec control unit 303 is set to OFF in step S701 SA message pick-up mark is set to ON.In step S705,303 standbies of IPSec control unit receive the request that sends SA information up to it.
When the network I/F control unit 305 of the operator scheme (being normal electricity pattern or battery saving mode) of monitor message treatment facility 210 identified messaging device 210 and turns back to the normal electricity pattern, this network I/F control unit 305 sent the request that sends SA information.If IPSec control unit 303 determines to receive the request ("Yes" among the step S705) that sends SA information, then handle proceeding to step S706.In step S706, the SA information that IPSec control unit 303 will be stored among the RAM 224 sends to messaging device 210 via the communication unit between the CPU 306.
Fig. 8 shows the operation of the IPSec processing unit 304 of NIC 220.In step S801,304 standbies of IPSec processing unit are up to sending the bag that receives from LAN 120 from network I/F control unit 305.If receive bag ("Yes" among the step S801), then handle and proceed to step S802, whether IPSec processing unit 304 sends to the MAC Address of NIC equipment 220 with reference to ethernet frame (Ethernet frame) part of the bag that receives with the bag of determining to receive.
Do not send to the MAC Address of NIC equipment 220 ("No" among the step S802) if determine the bag that receives, then handle proceeding to step S809, abandon the bag that receives, and finish this processing.
On the other hand, if the bag that receives sends to the MAC Address ("Yes" among the step S802) of NIC equipment 220, then handle and proceed to step S803.In step S803, whether IPSec processing unit 304 is IPSec head (ESP head or AH head) based on the head after ethernet frame, determines whether the bag that receives is IPSec bag (whether the bag that perhaps receives is encrypted).If determining the bag that receives is not IPSec bag ("No" among the step S803), then in step S808, the bag that IPSec processing unit 304 will receive is sent to proxy response processing unit 301, and end process.
If the bag that receives is an IPSec bag ("Yes" among the step S803), then in step S804, IPSec processing unit 304 determines whether to receive SA information with reference to the SA message pick-up mark on the RAM 224.
If do not receive SA information ("No" among the step S804), then in step S808, the bag that IPSec processing unit 304 will receive is sent to proxy response processing unit 301, and end process.Because not at the SA information of IPSec communication, thus IPSec to hold consultation, yet as mentioned above, NIC 220 can't carry out negotiations (not supporting because of it).
If determine to receive SA information ("Yes" among the step S804), then in step S805, the IPSec bag is decrypted based on the SA information that is stored among the RAM 224.Yet, if being provided the AH head, the IPSec bag is used as the IPSec head, the IPSec bag is not encrypted, thereby does not need decryption processing.
In step S806, the bag of deciphering is carried out authentication processing based on the SA information that is stored among the RAM 224.In step S807, determine the result of authentication processing.If the result who handles is ("No" among the step S807) of negating, determine that then the bag that receives is wrong, and processing proceeds to step S809.In step S809, abandon the bag that receives, and end process.If the result who handles is acceptable ("Yes" among the step S807), then in step S808, the clean reception bag of having deleted IPSec head and verify data is sent to proxy response processing unit 301, and processing finishes.
Fig. 9 shows the operation of proxy response processing unit 301.In step S901,301 standbies of proxy response processing unit receive the bag that sends from IPSec processing unit 304 up to it.If receive bag ("Yes" among the step S901), then handle proceeding to step S902, proxy response processing unit 301 determines that whether the bag that receives is " will on behalf of the bag of response ".
Based on the pack mode information of messaging device 210 before being transformed into battery saving mode at messaging device 210, carry out above-mentioned definite to NIC 220 notices.More particularly, when messaging device 210 was operated with battery saving mode, messaging device 210 was used to discern the reception pack mode of the bag that NIC 220 will respond and the transmission bag that will send in response and they is registered to NIC 220 notice.When NIC 220 receives when receiving the consistent bag of pack mode, proxy response processing unit 301 determines that these bags are " will on behalf of the bag of response " ("Yes" among the step S902), and handles and proceed to step S906.
If it is not " will on behalf of the bag of response " ("No" among the step S902) that proxy response processing unit 301 is determined these bags that receive, then handle and proceed to step S903, proxy response processing unit 301 determines whether the bag that receives is " bag that will be sent to messaging device 210 ".Identical with the situation about determining among the step S902, based on the pack mode information of messaging device 210 before being transformed into battery saving mode at messaging device 210, determine to NIC 220 notices.
If it is " bag that will be sent to messaging device 210 " ("Yes" among the step S903) that proxy response processing unit 301 is determined the bag that receives, then handle and proceed to step S905, the bag that receives is sent to messaging device 210.On the other hand, not " bag that will be sent to messaging device 210 " ("No" among the step S903) if proxy response processing unit 301 is determined the bag that receives, then handle proceeding to step S904, the bag that receives is abandoned.
In step S906, proxy response processing unit 301 generates will be as the respond packet that the response of the bag that receives is sent.Then, in step S907, proxy response processing unit 301 calls IPSec and sends processing storehouse 302, and the bag that will receive is sent to IPSec transmission processing storehouse 302 as inner parameter.
In step S908, proxy response processing unit 301 is determined to send from IPSec whether the API return value of handling storehouse 302 is " needing to transmit ".If the API return value is " needing to transmit " ("Yes" among the step S908), then handle and proceed to step S905, the bag that receives is sent to messaging device 210.If the API return value is not " needing to transmit " ("No" among the step S908), then to handle and proceed to step S909, proxy response processing unit 301 is determined to send from IPSec whether the API return value of handling storehouse 302 is " OK " (can accept).
If determine that the API return value is " OK " ("Yes" among the step S909), then in step S910, respond packet is sent to external equipment, otherwise ("No" among the step S909), processing proceeds to step S904, and the bag that receives is abandoned.
The IPSec that Figure 10 shows NIC 220 sends the handling process of handling storehouse 302.IPSec sends processing storehouse 302 and provides API to proxy response processing unit 301.This flow process shows the processing when calling API.
As mentioned above, the bag that proxy response processing unit 301 will generate is sent to IPSec transmission processing storehouse 302 as the inner parameter of API, handles (respond packet is encrypted) respond packet is carried out IPSec.
In step S1001, IPSec send to handle the transmission source address of determining whether to exist among the SAD on RAM 224 bag that transmits with parameter as API in storehouse 302, sends destination-address, sends source port number, sends destination port numbers and the corresponding SA information of protocol type.If there is no corresponding SA information ("No" among the step S1001) then in step S1007, will " need to transmit " return value that is set to API, and end API.If get access to this return value, then proxy response processing unit 301 makes messaging device 210 return from battery saving mode, and the bag that will receive is sent to messaging device 210.
If there is corresponding SA information ("Yes" among the step S1001), then in step S1002, IPSec sends processing storehouse 302 and determines whether the SA information are effective.If it is expired that the life-span of SA information does not have, it is effective then to be defined as SA information.
If be defined as SA information invalid ("No" among the step S 1002), then handle and proceed to step S1007, will " need to transmit " return value that is set to API, and end API.If be defined as SA information effectively ("Yes" among the step S 1002), then handle and proceed to step S 1003 and step S 1004, IPSec sends processing storehouse 302 and performs encryption processing and authentication processing to sending bag according to SA information, and described bag is set to the external parameter of API.
In step S1005, IPSec sends and handles storehouse 302 renewal SAD.Here the SAD information of Geng Xining is to send data volume 409 and sequence number 410.In step S1006, " OK " that indication IPSec handled normal termination is set to the API return value, and finishes API.Though not shown in flow process, if IPSec handles not normal termination, then " OK " is not set to the API return value.
As mentioned above, when messaging device 210 entered battery saving mode, messaging device 210 can be notified the information of obtaining by messaging device 210 and external equipment (PC110) negotiation that is used for communicating (SA information) to Network Interface Unit (NIC 220).
Therefore, enter at messaging device 210 under the situation of battery saving mode, even sent the bag of encrypting, also can the bag that receive be decrypted, and not need NIC 220 and external equipment to hold consultation once more from external equipment.In other words, even the bag that receives is encrypted, NIC 220 also can replace messaging device 210 to respond, and does not need to make messaging device 210 to return from battery saving mode.
Below, second exemplary embodiment of the present invention is described.Second exemplary embodiment is described in the standard IEEE 802.1X of communication system electrification Electronic Engineering Association and carries out processing under authentication processing and communication system and the situation that LAN 120 is connected.Though IEEE802.1X is described the example as Verification System here, this exemplary embodiment goes for using the situation of other Verification System.With similar parts in identical Reference numeral and the textual representation and first exemplary embodiment, and omit its detailed description.
IEEE802.1X operates by the cooperation between three inscapes; The applicant who authenticates, based on authentication result to terminal conduct interviews control authenticating party and the certificate server (radius server) of administrative authentication information.In other words, this is the security mechanism that authenticating party only allows the applicant of process certificate server authentication to communicate.
Figure 11 is the general illustration that comprises the network of communication system 100.Communication system 100, LAN interchanger 1101 and certificate server 1102 are connected to each other and can communicate by letter mutually via LAN 120.Communication system 100, LAN interchanger 1101 and certificate server 1102 are born the function of applicant, authenticating party and the certificate server (radius server) of IEEE802.1X respectively.
When communication system 100 when the physical circuit layer is connected to LAN 120, communication system 100 is carried out the IEEE802.1X authentication.Communication system 100 authenticates through certificate server 1102, and is allowed to communicate with LAN interchanger 1101.Even after initial authentication, certificate server 1102 also asks communication system 100 to carry out the IEEE802.1X authentication at interval once more with regular time.Regular time is based on the value that the keeper is provided with certificate server 1102 at interval.
Figure 12 is the block diagram that the software arrangements of communication system 100 is shown.Conversion between sleep control unit 1210 control normal electricity patterns and the battery saving mode.IEEE802.1X processing unit 1209 is consulted with certificate server 1102, with execution IEEE802.1X authentication processing, and obtains authentication result.IEEE802.1X control unit 1208 control IEEE802.1X processing units 1209.
Communication unit 1207 between the CPU sends data or receives data from this software to the software of operating on NIC220 via expansion I/F 212 and expansion I/F 222.Communication unit 1206 between the CPU sends data or receives data from this software to the software of operation on messaging device 210 via expansion I/F 222 and expansion I/F 212.
IEEE802.1X processing unit 1204 is held consultation with certificate server 1102, with execution IEEE802.1X authentication processing, and obtains authentication result.IEEE802.1X control unit 1203 control IEEE802.1X processing units 1204.
Network I/F control unit 1205 is controlled the transmission and the reception of the bag that is undertaken by network I/F 225.Network I/F control unit 1205 monitor message treatment facilities 210 with which kind of pattern (normal electricity pattern or battery saving mode) are operated.When messaging device 210 is operated with the normal electricity pattern, network I/F control unit 1205 will be sent to messaging device 210 from the bag that LAN 120 receives.When messaging device 210 is operated with battery saving mode, network I/F control unit 1205 will be sent to IEEE802.1X processing unit 1204 from the bag that LAN 120 receives.
Proxy response processing unit 1201 receives the reception bag that transmits from IEEE802.1X processing unit 1204.IEEE802.1X processing unit 1204 only receives bag when messaging device 210 is operated with battery saving mode, so only operation in this case of proxy response processing unit 1201.
The bag that proxy response processing unit 1201 will receive is divided into three types: " bag that will abandon ", " will be sent to the bag of messaging device 210 " and " will on behalf of response bag "." bag that will abandon ", " will be sent to the bag of messaging device 210 " and " will on behalf of response bag " with in first exemplary embodiment, describe identical.
Figure 13 to Figure 16 describes when messaging device 210 enters battery saving mode, and messaging device 210 is notified the flow chart of the processing of the authentication information that obtains by messaging device 210 and certificate server 1102 negotiations to NIC 220.
Each operation (step) shown in the flow chart of Figure 13 is realized by CPU 211 executive control programs of messaging device 210.Each operation (step) shown in the flow chart of Figure 14 to Figure 16 is realized by CPU 221 executive control programs of NIC 220.
The sleep control unit 1210 of messaging device 210 is operated to be similar to the mode of describing in Fig. 5 of first exemplary embodiment, and therefore the descriptions thereof are omitted.Yet, in the step S501 of Fig. 5, whether sleep control unit 310 can be transformed into sleep state to IPSec control unit 308 inquiry message treatment facilities 210, and in this exemplary embodiment, sleep control unit 1210 inquiry IEEE802.1X control units 1208.In the step S504 of Fig. 5, sleep control unit 310 is transformed into sleep state to IPSec control unit 308 notices, and in this exemplary embodiment, sleep control unit 1210 notice IEEE802.1X control units 1208.In the step S505 of Fig. 5, the response that sleep control unit 310 is waited for from IPSec control unit 308, and in this exemplary embodiment, the response that sleep control unit 1210 is waited for from IEEE802.1X control unit 1208.
Figure 13 shows the operation of IEEE802.1X control unit 1208.In step S1301,1208 standbies of IEEE802.1X control unit are transformed into sleep state up to sleep control unit 1210 to IEEE802.1X control unit 1208 notices.
If sleep control unit 1210 is transformed into sleep state ("Yes" among the step S1301) to IEEE802.1X control unit 1208 notices, then handle and proceed to step S1302, IEEE802.1X control unit 1208 obtains the authentication information that is stored among the RAM 214.In step S1303, the authentication information that IEEE802.1X control unit 1208 obtains in step S1302 to NIC 220 notices via the communication unit between the CPU 1207.
In step S1304, IEEE802.1X control unit 1208 sends response to sleep control unit 1210.Afterwards, messaging device 210 enters sleep pattern, thus 1208 shut-down operations of IEEE802.1X control unit.
Figure 14 shows the operation of the IEEE802.1X control unit 1203 of NIC 220.In step S1401, IEEE802.1X control unit 1203 authentication informations receive mark and are set to OFF.Authentication information is received in the zone that marker stores guarantees on RAM 224.IEEE802.1X processing unit 1204 is with reference to this mark.
In step S1402, IEEE802.1X control unit 1203 is waited for from messaging device 210 and is received authentication information.If IEEE802.1X control unit 1203 receives authentication information ("Yes" among the step S1402), then in step S1403, IEEE802.1X control unit 1203 is guaranteed the zone on RAM224, is stored in wherein with the authentication information that will receive.Processing proceeds to step S1404, and IEEE802.1X control unit 1203 is set to OFF in step S1401 authentication information reception mark is set to ON.
Figure 15 shows the operation of the IEEE802.1X processing unit 1204 of NIC 220.In step S1501,1204 standbies of IEEE802.1X processing unit are up to sending the bag that receives from LAN 120 from network I/F control unit 1205.If receive bag ("Yes" among the step S1501), then handle and proceed to step S1502, whether IEEE802.1X processing unit 1204 sends to the MAC Address of NIC equipment 220 with reference to the ethernet frame part of the bag that receives with the bag of determining to receive.
Do not send to the MAC Address of NIC equipment 220 ("No" among the step S1502) if determine the bag that receives, then handle proceeding to step S1508, abandon the bag that receives, and end process.
On the other hand, if the bag that receives sends to the MAC Address ("Yes" among the step S1502) of NIC equipment 220, then handle and proceed to step S1503, IEEE802.1X processing unit 1204 determines whether the bag that receives is IEEE802.1X authentication request bag once more.If determining the bag that receives is not IEEE802.1X authentication request bag ("No" among the step S1503) once more, then in step S 1507, the bag that IEEE802.1X processing unit 1204 will receive is sent to proxy response processing unit 1201, and end process.
If the bag that receives is an IEEE802.1X authentication request bag ("Yes" among the step S1503) once more, then handle and proceed to step S1504, IEEE802.1X processing unit 1204 receives mark with reference to the authentication information on the RAM224 and determines whether to receive authentication information.
If do not receive authentication information ("No" among the step S1504), then in step S1507, the bag that IEEE802.1X processing unit 1204 will receive is sent to proxy response processing unit 1201, and end process.
If determine to receive authentication information ("Yes" among the step S1504), then in step S1505, generate respond packet based on the authentication information that is stored among the RAM 224.In step S1506, send the respond packet that generates, and processing finishes.
Figure 16 shows the operation of proxy response processing unit 1201.In step S1601,1201 standbies of proxy response processing unit receive the bag that sends from IEEE802.1X processing unit 1204 up to it.If receive bag ("Yes" among the step S 1601), then handle proceeding to step S 1602, proxy response processing unit 1201 determines that whether the bag that receives is " will on behalf of the bag of response ".
Based on the pack mode information of messaging device 210 before being transformed into battery saving mode at messaging device 210, carry out above-mentioned definite to NIC 220 notices.More particularly, when messaging device 210 was operated with battery saving mode, messaging device 210 was used to discern the reception pack mode of the bag that NIC 220 will respond and the transmission bag that will send in response and they is registered to NIC 220 notice.When NIC 220 receives when receiving the consistent bag of pack mode, proxy response processing unit 1201 determines that these bags that receive are " will on behalf of the bag of response " ("Yes" among the step S1602), and handles and proceed to step S1606.
If it is not " will on behalf of response bag " ("No" among the step S1602) that proxy response processing unit 1201 is determined the bag that receives, then handle and proceed to step S1603, proxy response processing unit 1201 determines whether the bag that receives is " bag that will be sent to messaging device 210 ".Identical with the situation about determining among the step S1602, based on the pack mode information of messaging device 210 before being transformed into battery saving mode at messaging device 210, determine to NIC 220 notices.
If it is " bag that will be sent to messaging device 210 " ("Yes" among the step S 1603) that proxy response processing unit 1201 is determined the bag that receives, then handle and proceed to step S1605, the bag that receives is sent to messaging device 210.On the other hand, not " bag that will be sent to messaging device 210 " ("No" among the step S1603) if proxy response processing unit 1201 is determined the bag that receives, then handle proceeding to step S1604, the bag that receives is abandoned.
In step S1606, proxy response processing unit 1201 generates will be as the respond packet that the response of the bag that receives is sent.Processing proceeds to step S1607, and respond packet is sent to external equipment, and end process.
As mentioned above, when messaging device 210 entered battery saving mode, messaging device 210 can be notified the information of obtaining by messaging device 210 and external equipment (certificate server 1102) negotiation (authentication information) to Network Interface Unit (NIC 220).
Therefore, enter at messaging device 210 under the situation of battery saving mode, NIC 220 can communicate via network, and does not need NIC 220 and external equipment to hold consultation once more.
Each side of the present invention can also by read and executive logging carry out in being used on the storage device the foregoing description functional programs system or equipment computer (or such as CPU or MPU device) and come the method for execution in step to realize by the functional programs that the computer of system or equipment is for example read and executive logging being used on storage device carried out the foregoing description.Given this, for example provide program to computer via network or from various types of recording mediums (for example computer-readable medium) as storage device.
Though describe the present invention, should be appreciated that to the invention is not restricted to disclosed exemplary embodiment with reference to exemplary embodiment.Should give the wideest explanation to the scope of claims, so that it contains all this modification, equivalent structure and function.

Claims (15)

1. messaging device, this messaging device comprises:
Memory cell, its be configured to store by obtain with the negotiation of external equipment, be used for the information that communicates via network;
Detecting unit when it is configured to operate under the normal electricity pattern, detects and whether satisfies the condition of power consumption less than the battery saving mode of described normal electricity pattern that be transformed into; And
Notification unit, it is configured to when satisfying when being transformed into the condition of described battery saving mode, to Network Interface Unit notice institute canned data.
2. messaging device according to claim 1, this messaging device also comprises: determining unit, this determining unit are configured to determine whether institute's canned data is effective,
Wherein, under the effective situation of definite institute's canned data, described notification unit is notified institute's canned data to described Network Interface Unit.
3. messaging device according to claim 1, this messaging device also comprises:
Acquiring unit, its be configured to obtain after described battery saving mode turns back to described normal electricity pattern described notification unit to described Network Interface Unit notice, based on the result of described Network Interface Unit and described external device communication and updated information; And
Updating block, it is configured to upgrade institute's canned data based on the described information that described acquiring unit obtains.
4. messaging device according to claim 1, wherein, the information of being obtained is the information of using when the coded communication of carrying out based on IPSec.
5. messaging device according to claim 1, wherein, the information of being obtained is meant the authentication information that obtains as the result of the authentication processing of using 802.1X to carry out.
6. Network Interface Unit comprises:
Acquiring unit, its be configured to when messaging device from the normal electricity mode switch to power consumption during less than the battery saving mode of described normal electricity pattern, from described messaging device obtain obtain by the negotiation between described messaging device and the external equipment, be used for the information that communicates via network; And
Communication unit, it is configured to use the information and the described external equipment that are obtained to communicate.
7. Network Interface Unit according to claim 6, this Network Interface Unit also comprises:
Response unit, it is configured to when described messaging device is transformed into described battery saving mode the bag that receives from described network be responded; And
Decrypting device, it is configured to use the information of being obtained that received bag is decrypted,
Wherein, described response unit responds based on the bag after deciphering.
8. Network Interface Unit according to claim 6, this Network Interface Unit also comprises: ciphering unit, described ciphering unit are configured to use the information obtained to being encrypted as the bag that the response of the described bag that receives from described network is sent by response unit.
9. Network Interface Unit according to claim 6, this Network Interface Unit also comprises:
Determining unit, it is configured to determine whether the information of being obtained is effective; And
Delivery unit, it is configured to will be sent to described messaging device from the bag that described network receives under the invalid situation of the information of determining to be obtained.
10. method, this method may further comprise the steps:
Storage by obtain with the negotiation of external equipment, be used for the information that communicates via network;
When under the normal electricity pattern, operating, detect and whether satisfy the condition of power consumption that be transformed into less than the battery saving mode of described normal electricity pattern; And
When satisfying when being transformed into the condition of described battery saving mode, to Network Interface Unit notice institute canned data.
11. method according to claim 10, this method is further comprising the steps of:
Determine whether institute's canned data is effective; And
Under the effective situation of definite institute's canned data, notify institute's canned data to described Network Interface Unit.
12. method according to claim 10, this method is further comprising the steps of:
Obtain after described battery saving mode turns back to described normal electricity pattern to described Network Interface Unit notice, based on the result of described Network Interface Unit and described external device communication and updated information; And
According to based on the result of described Network Interface Unit and described external device communication and updated information is upgraded institute's canned data.
13. a method, this method may further comprise the steps:
When messaging device from the normal electricity mode switch to power consumption during less than the battery saving mode of described normal electricity pattern, from described messaging device obtain obtain by the negotiation between described messaging device and the external equipment, be used for the information that communicates via network; And
Use the information and the described external equipment that are obtained to communicate.
14. method according to claim 13, this method is further comprising the steps of:
When described messaging device is transformed into described battery saving mode, the bag that receives from described network is responded; And
Use the information of being obtained that received bag is decrypted,
Wherein, described response is based on the bag after the deciphering.
15. method according to claim 13, this method is further comprising the steps of:
Determine whether the information of being obtained is effective; And
Under the invalid situation of the information of determining to be obtained, will be sent to described messaging device from the bag that described network receives.
CN201010133053.2A 2009-03-13 2010-03-12 Messaging device, Network Interface Unit and control method thereof Expired - Fee Related CN101834752B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2009-060685 2009-03-13
JP2009060685A JP5377009B2 (en) 2009-03-13 2009-03-13 Information processing apparatus, communication system, information processing apparatus control method, and program

Publications (2)

Publication Number Publication Date
CN101834752A true CN101834752A (en) 2010-09-15
CN101834752B CN101834752B (en) 2015-09-02

Family

ID=42718688

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010133053.2A Expired - Fee Related CN101834752B (en) 2009-03-13 2010-03-12 Messaging device, Network Interface Unit and control method thereof

Country Status (3)

Country Link
US (1) US8914654B2 (en)
JP (1) JP5377009B2 (en)
CN (1) CN101834752B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110612773A (en) * 2017-04-24 2019-12-24 惠普发展公司,有限责任合伙企业 Operating mode configuration

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2011189646A (en) * 2010-03-15 2011-09-29 Ricoh Co Ltd Image forming apparatus
JP2012160086A (en) * 2011-02-01 2012-08-23 Murata Mach Ltd Data processing device, client device, and data processing system
JP5763934B2 (en) * 2011-02-17 2015-08-12 キヤノン株式会社 Data processing apparatus and power saving control method thereof
JP5818470B2 (en) 2011-03-15 2015-11-18 キヤノン株式会社 Information processing apparatus, information processing apparatus control method, and program
US8848256B2 (en) 2011-04-08 2014-09-30 Canon Kabushiki Kaisha Printing apparatus acquiring color correction data before entering a power saving mode
JP5762106B2 (en) * 2011-04-20 2015-08-12 キヤノン株式会社 COMMUNICATION DEVICE, ITS CONTROL METHOD, AND PROGRAM
JP5824257B2 (en) * 2011-06-29 2015-11-25 キヤノン株式会社 Image processing apparatus, control method thereof, and program
JP2013144410A (en) * 2012-01-16 2013-07-25 Canon Inc Image forming apparatus, control method thereof, and program therefor
JP5939038B2 (en) * 2012-05-30 2016-06-22 セイコーエプソン株式会社 Printing apparatus and printing apparatus control method
JP2016063234A (en) * 2014-09-12 2016-04-25 富士通株式会社 Communication control method for communication device, communication device, and communication control system
JP2018200646A (en) * 2017-05-29 2018-12-20 株式会社沖データ Information processing apparatus and image formation apparatus
JP7045247B2 (en) * 2017-08-25 2022-03-31 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ Communication protection device, control method, and program
US10979390B2 (en) 2017-08-25 2021-04-13 Panasonic Intellectual Property Corporation Of America Communication security apparatus, control method, and storage medium storing a program
JP2023117957A (en) * 2022-02-14 2023-08-24 キヤノン株式会社 Image processing device, control method of the same, and program

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060236143A1 (en) * 2005-03-15 2006-10-19 Kazuaki Kidoguchi Communication control apparatus, communication control system, power-saving control method, power-saving control program, and recording medium for recording the program
US20080025305A1 (en) * 2006-07-25 2008-01-31 Jun Choi Multicasting system and network device to transmit data as an agency and a method thereof
WO2008115823A1 (en) * 2007-03-19 2008-09-25 Intel Corporation Techniques for always on always connected operation of mobile platforms using network interface cards

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000312203A (en) * 1999-04-27 2000-11-07 Nippon Telegr & Teleph Corp <Ntt> Method and system for passing control in encryption communication
GB2353676A (en) * 1999-08-17 2001-02-28 Hewlett Packard Co Robust encryption and decryption of packetised data transferred across communications networks
US6795450B1 (en) * 2000-09-28 2004-09-21 Tdk Semiconductor Corporation Method and apparatus for supporting physical layer link-suspend operation between network nodes
US20070067445A1 (en) * 2005-09-16 2007-03-22 Smart Link Ltd. Remote computer wake-up for network applications
US7746810B2 (en) * 2006-03-31 2010-06-29 Intel Corporation Wake on wireless network techniques
US9104406B2 (en) * 2009-01-07 2015-08-11 Microsoft Technology Licensing, Llc Network presence offloads to network interface

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060236143A1 (en) * 2005-03-15 2006-10-19 Kazuaki Kidoguchi Communication control apparatus, communication control system, power-saving control method, power-saving control program, and recording medium for recording the program
US20080025305A1 (en) * 2006-07-25 2008-01-31 Jun Choi Multicasting system and network device to transmit data as an agency and a method thereof
WO2008115823A1 (en) * 2007-03-19 2008-09-25 Intel Corporation Techniques for always on always connected operation of mobile platforms using network interface cards

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110612773A (en) * 2017-04-24 2019-12-24 惠普发展公司,有限责任合伙企业 Operating mode configuration
CN110612773B (en) * 2017-04-24 2023-09-05 惠普发展公司,有限责任合伙企业 Operation mode configuration

Also Published As

Publication number Publication date
CN101834752B (en) 2015-09-02
US20100235500A1 (en) 2010-09-16
JP2010219605A (en) 2010-09-30
US8914654B2 (en) 2014-12-16
JP5377009B2 (en) 2013-12-25

Similar Documents

Publication Publication Date Title
CN101834752B (en) Messaging device, Network Interface Unit and control method thereof
US7987366B2 (en) Key management for network elements
JP5123209B2 (en) Method, system, and authentication center for authentication in end-to-end communication based on a mobile network
CN101507228B (en) Improved authentication for devices located in cable networks
CN108604985B (en) Data transfer method, method for controlling data use, and cryptographic apparatus
US11736304B2 (en) Secure authentication of remote equipment
US8380980B2 (en) System and method for providing security in mobile WiMAX network system
CN109936529B (en) Method, device and system for secure communication
WO2004034645A1 (en) Identification information protection method in wlan interconnection
KR101560246B1 (en) System for Cloud Printing and Method of Cloud Printing Service using the Same
KR20060134774A (en) Device for realizing security function in mac of portable internet system and authentication method using the device
WO2017097101A1 (en) Method and apparatus for account number login
JP2011004385A (en) Information processing apparatus, mutual authentication method, mutual authentication program, information processing system, information processing method, information processing program, and recording medium
JP5795591B2 (en) Service flow encryption processing method and system
CN108605046B (en) Message pushing method and terminal
JP2002344443A (en) Communication system and security association disconnection/continuing method
JP2007228383A (en) Radio communication system supporting public wireless internet access service business
JP2005086428A (en) Method of obtaining authentication and performing crypto communication, authenticating system and authenticating method
CN102447674A (en) Method and device for security negotiation
CN109997342B (en) Method for providing service in network device, corresponding device and storage medium
JP2004135195A (en) Information equipment registration method, program for computer to execute the method, and information equipment
Shankar et al. A transparent key management scheme for wireless LANs using DHCP
Palombini et al. RFC 9203: The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework
KR20040050428A (en) system of user authentication process for wireless network and method thereof
Harney et al. RFC 4535: GSAKMP: Group Secure Association Key Management Protocol

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150902

Termination date: 20210312

CF01 Termination of patent right due to non-payment of annual fee